From cf9f5b565c85384ea8d9795bb2d5f6e08fd31d28 Mon Sep 17 00:00:00 2001 From: Kirill Nikolaev Date: Wed, 14 Feb 2024 09:53:45 +0200 Subject: [PATCH 1/2] Improves 'RemoteAddress' description for '*-NetFirewall' cmdlets on supported OSes Clearly specifies what is accepted on each operating system --- .../netsecurity/New-NetFirewallRule.md | 34 +++++++++++-------- .../Set-NetFirewallAddressFilter.md | 29 +++++++++------- .../netsecurity/Set-NetFirewallRule.md | 33 ++++++++++-------- .../netsecurity/New-NetFirewallRule.md | 34 +++++++++++-------- .../Set-NetFirewallAddressFilter.md | 29 +++++++++------- .../netsecurity/Set-NetFirewallRule.md | 33 ++++++++++-------- .../netsecurity/New-NetFirewallRule.md | 34 +++++++++++-------- .../Set-NetFirewallAddressFilter.md | 29 +++++++++------- .../netsecurity/Set-NetFirewallRule.md | 33 ++++++++++-------- .../netsecurity/New-NetFirewallRule.md | 16 +++++---- .../Set-NetFirewallAddressFilter.md | 15 +++++--- .../netsecurity/Set-NetFirewallRule.md | 19 +++++++---- 12 files changed, 197 insertions(+), 141 deletions(-) diff --git a/docset/winserver2016-ps/netsecurity/New-NetFirewallRule.md b/docset/winserver2016-ps/netsecurity/New-NetFirewallRule.md index 2097f0697e..3025850dfb 100644 --- a/docset/winserver2016-ps/netsecurity/New-NetFirewallRule.md +++ b/docset/winserver2016-ps/netsecurity/New-NetFirewallRule.md @@ -798,21 +798,25 @@ Accept wildcard characters: False ``` ### -RemoteAddress -Specifies that network packets with matching IP addresses match this rule. -This parameter value is an IPv4 or IPv6 address, subnet, range or keyword. -The acceptable formats for this parameter are: - -- Single IPv4 Address: 1.2.3.4 -- Single IPv6 Address: fe80::1 -- IPv4 Subnet (by network bit count): 1.2.3.4/24 -- IPv6 Subnet (by network bit count): fe80::1/48 -- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 -- IPv4 Range: 1.2.3.4-1.2.3.7 -- IPv6 Range: fe80::1-fe80::9 -- Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice. NOTE: Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword "LocalSubnet4" means that all local IPv4 addresses are matching this rule). - -Querying for rules with this parameter can only be performed using filter objects. -See the Get-NetFirewallAddressFilter cmdlet for more information. +Specifies that network packets with matching IP addresses match this rule. +This parameter value is an IPv4 or IPv6 address, subnet, range or keyword. +The acceptable formats for this parameter are: + +- Single IPv4 Address: 1.2.3.4 +- Single IPv6 Address: fe80::1 +- IPv4 Subnet (by network bit count): 1.2.3.4/24 +- IPv6 Subnet (by network bit count): fe80::1/48 +- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 +- IPv4 Range: 1.2.3.4-1.2.3.7 +- IPv6 Range: fe80::1-fe80::9 +- Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice. + +> [!TIP] +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword "LocalSubnet4" means that all local IPv4 addresses are matching this rule). + +> [!NOTE] +> Querying for rules with this parameter can only be performed using filter objects. +> See the [Get-NetFirewallAddressFilter](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] diff --git a/docset/winserver2016-ps/netsecurity/Set-NetFirewallAddressFilter.md b/docset/winserver2016-ps/netsecurity/Set-NetFirewallAddressFilter.md index 4b8527b6af..a2f5453b23 100644 --- a/docset/winserver2016-ps/netsecurity/Set-NetFirewallAddressFilter.md +++ b/docset/winserver2016-ps/netsecurity/Set-NetFirewallAddressFilter.md @@ -246,20 +246,25 @@ Accept wildcard characters: False ``` ### -RemoteAddress -Specifies that network packets with matching IP addresses match this rule. -This parameter value is the second end point of an IPsec rule and specifies the computers that are subject to the requirements of this rule. -This parameter value is an IPv4 or IPv6 address, hostname, subnet, range, or the following keyword: Any. -The acceptable formats for this parameter are: -- Single IPv4 Address: 1.2.3.4 -- Single IPv6 Address: fe80::1 -- IPv4 Subnet (by network bit count): 1.2.3.4/24 -- IPv6 Subnet (by network bit count): fe80::1/48 -- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 -- IPv4 Range: 1.2.3.4 through 1.2.3.7 -- IPv6 Range: fe80::1 through fe80::9 +Specifies that network packets with matching IP addresses match this rule. +This parameter value is an IPv4 or IPv6 address, subnet, range or keyword. +The acceptable formats for this parameter are: + +- Single IPv4 Address: 1.2.3.4 +- Single IPv6 Address: fe80::1 +- IPv4 Subnet (by network bit count): 1.2.3.4/24 +- IPv6 Subnet (by network bit count): fe80::1/48 +- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 +- IPv4 Range: 1.2.3.4-1.2.3.7 +- IPv6 Range: fe80::1-fe80::9 +- Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice. + +> [!TIP] +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword "LocalSubnet4" means that all local IPv4 addresses are matching this rule). > [!NOTE] -> Querying for rules with this parameter can only be performed using filter objects. See the **Get-NetFirewallAddressFilter** cmdlet for more information. +> Querying for rules with this parameter can only be performed using filter objects. +> See the [Get-NetFirewallAddressFilter](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] diff --git a/docset/winserver2016-ps/netsecurity/Set-NetFirewallRule.md b/docset/winserver2016-ps/netsecurity/Set-NetFirewallRule.md index fb9c5c663f..cfdc68d7db 100644 --- a/docset/winserver2016-ps/netsecurity/Set-NetFirewallRule.md +++ b/docset/winserver2016-ps/netsecurity/Set-NetFirewallRule.md @@ -898,19 +898,25 @@ Accept wildcard characters: False ``` ### -RemoteAddress -Specifies that network packets with matching IP addresses match this rule. -This parameter value is the second end point of an IPsec rule and specifies the computers that are subject to the requirements of this rule. -This parameter value is an IPv4 or IPv6 address, subnet, range, or the following keyword: Any. -The acceptable formats for this parameter are: -- Single IPv4 Address: 1.2.3.4 -- Single IPv6 Address: fe80::1 -- IPv4 Subnet (by network bit count): 1.2.3.4/24 -- IPv6 Subnet (by network bit count): fe80::1/48 -- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 -- IPv4 Range: 1.2.3.4 through 1.2.3.7 -- IPv6 Range: fe80::1 through fe80::9 -Querying for rules with this parameter can only be performed using filter objects. -See the Get-NetFirewallAddressFilter cmdlet for more information. +Specifies that network packets with matching IP addresses match this rule. +This parameter value is an IPv4 or IPv6 address, subnet, range or keyword. +The acceptable formats for this parameter are: + +- Single IPv4 Address: 1.2.3.4 +- Single IPv6 Address: fe80::1 +- IPv4 Subnet (by network bit count): 1.2.3.4/24 +- IPv6 Subnet (by network bit count): fe80::1/48 +- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 +- IPv4 Range: 1.2.3.4-1.2.3.7 +- IPv6 Range: fe80::1-fe80::9 +- Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice. + +> [!TIP] +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword "LocalSubnet4" means that all local IPv4 addresses are matching this rule). + +> [!NOTE] +> Querying for rules with this parameter can only be performed using filter objects. +> See the [Get-NetFirewallAddressFilter](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] @@ -1100,4 +1106,3 @@ The path after the pound sign (`#`) provides the namespace and class name for th [Set-NetFirewallSetting](./Set-NetFirewallSetting.md) [Show-NetFirewallRule](./Show-NetFirewallRule.md) - diff --git a/docset/winserver2019-ps/netsecurity/New-NetFirewallRule.md b/docset/winserver2019-ps/netsecurity/New-NetFirewallRule.md index c4339ed36f..6b719458ce 100644 --- a/docset/winserver2019-ps/netsecurity/New-NetFirewallRule.md +++ b/docset/winserver2019-ps/netsecurity/New-NetFirewallRule.md @@ -798,21 +798,25 @@ Accept wildcard characters: False ``` ### -RemoteAddress -Specifies that network packets with matching IP addresses match this rule. -This parameter value is an IPv4 or IPv6 address, subnet, range or keyword. -The acceptable formats for this parameter are: - -- Single IPv4 Address: 1.2.3.4 -- Single IPv6 Address: fe80::1 -- IPv4 Subnet (by network bit count): 1.2.3.4/24 -- IPv6 Subnet (by network bit count): fe80::1/48 -- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 -- IPv4 Range: 1.2.3.4-1.2.3.7 -- IPv6 Range: fe80::1-fe80::9 -- Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice. NOTE: Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword "LocalSubnet4" means that all local IPv4 addresses are matching this rule). - -Querying for rules with this parameter can only be performed using filter objects. -See the Get-NetFirewallAddressFilter cmdlet for more information. +Specifies that network packets with matching IP addresses match this rule. +This parameter value is an IPv4 or IPv6 address, subnet, range or keyword. +The acceptable formats for this parameter are: + +- Single IPv4 Address: 1.2.3.4 +- Single IPv6 Address: fe80::1 +- IPv4 Subnet (by network bit count): 1.2.3.4/24 +- IPv6 Subnet (by network bit count): fe80::1/48 +- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 +- IPv4 Range: 1.2.3.4-1.2.3.7 +- IPv6 Range: fe80::1-fe80::9 +- Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice, CaptivePortal (Windows 10 only). + +> [!TIP] +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword "LocalSubnet4" means that all local IPv4 addresses are matching this rule). + +> [!NOTE] +> Querying for rules with this parameter can only be performed using filter objects. +> See the [Get-NetFirewallAddressFilter](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] diff --git a/docset/winserver2019-ps/netsecurity/Set-NetFirewallAddressFilter.md b/docset/winserver2019-ps/netsecurity/Set-NetFirewallAddressFilter.md index f097834a87..40e2d3e620 100644 --- a/docset/winserver2019-ps/netsecurity/Set-NetFirewallAddressFilter.md +++ b/docset/winserver2019-ps/netsecurity/Set-NetFirewallAddressFilter.md @@ -246,20 +246,25 @@ Accept wildcard characters: False ``` ### -RemoteAddress -Specifies that network packets with matching IP addresses match this rule. -This parameter value is the second end point of an IPsec rule and specifies the computers that are subject to the requirements of this rule. -This parameter value is an IPv4 or IPv6 address, hostname, subnet, range, or the following keyword: Any. -The acceptable formats for this parameter are: -- Single IPv4 Address: 1.2.3.4 -- Single IPv6 Address: fe80::1 -- IPv4 Subnet (by network bit count): 1.2.3.4/24 -- IPv6 Subnet (by network bit count): fe80::1/48 -- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 -- IPv4 Range: 1.2.3.4 through 1.2.3.7 -- IPv6 Range: fe80::1 through fe80::9 +Specifies that network packets with matching IP addresses match this rule. +This parameter value is an IPv4 or IPv6 address, subnet, range or keyword. +The acceptable formats for this parameter are: + +- Single IPv4 Address: 1.2.3.4 +- Single IPv6 Address: fe80::1 +- IPv4 Subnet (by network bit count): 1.2.3.4/24 +- IPv6 Subnet (by network bit count): fe80::1/48 +- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 +- IPv4 Range: 1.2.3.4-1.2.3.7 +- IPv6 Range: fe80::1-fe80::9 +- Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice, CaptivePortal (Windows 10 only). + +> [!TIP] +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword "LocalSubnet4" means that all local IPv4 addresses are matching this rule). > [!NOTE] -> Querying for rules with this parameter can only be performed using filter objects. See the **Get-NetFirewallAddressFilter** cmdlet for more information. +> Querying for rules with this parameter can only be performed using filter objects. +> See the [Get-NetFirewallAddressFilter](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] diff --git a/docset/winserver2019-ps/netsecurity/Set-NetFirewallRule.md b/docset/winserver2019-ps/netsecurity/Set-NetFirewallRule.md index f287fb734a..fb3e0d2656 100644 --- a/docset/winserver2019-ps/netsecurity/Set-NetFirewallRule.md +++ b/docset/winserver2019-ps/netsecurity/Set-NetFirewallRule.md @@ -898,19 +898,25 @@ Accept wildcard characters: False ``` ### -RemoteAddress -Specifies that network packets with matching IP addresses match this rule. -This parameter value is the second end point of an IPsec rule and specifies the computers that are subject to the requirements of this rule. -This parameter value is an IPv4 or IPv6 address, subnet, range, or the following keyword: Any. -The acceptable formats for this parameter are: -- Single IPv4 Address: 1.2.3.4 -- Single IPv6 Address: fe80::1 -- IPv4 Subnet (by network bit count): 1.2.3.4/24 -- IPv6 Subnet (by network bit count): fe80::1/48 -- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 -- IPv4 Range: 1.2.3.4 through 1.2.3.7 -- IPv6 Range: fe80::1 through fe80::9 -Querying for rules with this parameter can only be performed using filter objects. -See the Get-NetFirewallAddressFilter cmdlet for more information. +Specifies that network packets with matching IP addresses match this rule. +This parameter value is an IPv4 or IPv6 address, subnet, range or keyword. +The acceptable formats for this parameter are: + +- Single IPv4 Address: 1.2.3.4 +- Single IPv6 Address: fe80::1 +- IPv4 Subnet (by network bit count): 1.2.3.4/24 +- IPv6 Subnet (by network bit count): fe80::1/48 +- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 +- IPv4 Range: 1.2.3.4-1.2.3.7 +- IPv6 Range: fe80::1-fe80::9 +- Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice, CaptivePortal (Windows 10 only). + +> [!TIP] +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword "LocalSubnet4" means that all local IPv4 addresses are matching this rule). + +> [!NOTE] +> Querying for rules with this parameter can only be performed using filter objects. +> See the [Get-NetFirewallAddressFilter](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] @@ -1100,4 +1106,3 @@ The path after the pound sign (`#`) provides the namespace and class name for th [Set-NetFirewallSetting](./Set-NetFirewallSetting.md) [Show-NetFirewallRule](./Show-NetFirewallRule.md) - diff --git a/docset/winserver2022-ps/netsecurity/New-NetFirewallRule.md b/docset/winserver2022-ps/netsecurity/New-NetFirewallRule.md index a72b7076c7..701f76de83 100644 --- a/docset/winserver2022-ps/netsecurity/New-NetFirewallRule.md +++ b/docset/winserver2022-ps/netsecurity/New-NetFirewallRule.md @@ -798,21 +798,25 @@ Accept wildcard characters: False ``` ### -RemoteAddress -Specifies that network packets with matching IP addresses match this rule. -This parameter value is an IPv4 or IPv6 address, subnet, range or keyword. -The acceptable formats for this parameter are: - -- Single IPv4 Address: 1.2.3.4 -- Single IPv6 Address: fe80::1 -- IPv4 Subnet (by network bit count): 1.2.3.4/24 -- IPv6 Subnet (by network bit count): fe80::1/48 -- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 -- IPv4 Range: 1.2.3.4-1.2.3.7 -- IPv6 Range: fe80::1-fe80::9 -- Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice. NOTE: Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword "LocalSubnet4" means that all local IPv4 addresses are matching this rule). - -Querying for rules with this parameter can only be performed using filter objects. -See the Get-NetFirewallAddressFilter cmdlet for more information. +Specifies that network packets with matching IP addresses match this rule. +This parameter value is an IPv4 or IPv6 address, subnet, range or keyword. +The acceptable formats for this parameter are: + +- Single IPv4 Address: 1.2.3.4 +- Single IPv6 Address: fe80::1 +- IPv4 Subnet (by network bit count): 1.2.3.4/24 +- IPv6 Subnet (by network bit count): fe80::1/48 +- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 +- IPv4 Range: 1.2.3.4-1.2.3.7 +- IPv6 Range: fe80::1-fe80::9 +- Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice, CaptivePortal. + +> [!TIP] +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword "LocalSubnet4" means that all local IPv4 addresses are matching this rule). + +> [!NOTE] +> Querying for rules with this parameter can only be performed using filter objects. +> See the [Get-NetFirewallAddressFilter](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] diff --git a/docset/winserver2022-ps/netsecurity/Set-NetFirewallAddressFilter.md b/docset/winserver2022-ps/netsecurity/Set-NetFirewallAddressFilter.md index 8c17d6ce00..b117e06ce6 100644 --- a/docset/winserver2022-ps/netsecurity/Set-NetFirewallAddressFilter.md +++ b/docset/winserver2022-ps/netsecurity/Set-NetFirewallAddressFilter.md @@ -246,20 +246,25 @@ Accept wildcard characters: False ``` ### -RemoteAddress -Specifies that network packets with matching IP addresses match this rule. -This parameter value is the second end point of an IPsec rule and specifies the computers that are subject to the requirements of this rule. -This parameter value is an IPv4 or IPv6 address, hostname, subnet, range, or the following keyword: Any. -The acceptable formats for this parameter are: -- Single IPv4 Address: 1.2.3.4 -- Single IPv6 Address: fe80::1 -- IPv4 Subnet (by network bit count): 1.2.3.4/24 -- IPv6 Subnet (by network bit count): fe80::1/48 -- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 -- IPv4 Range: 1.2.3.4 through 1.2.3.7 -- IPv6 Range: fe80::1 through fe80::9 +Specifies that network packets with matching IP addresses match this rule. +This parameter value is an IPv4 or IPv6 address, subnet, range or keyword. +The acceptable formats for this parameter are: + +- Single IPv4 Address: 1.2.3.4 +- Single IPv6 Address: fe80::1 +- IPv4 Subnet (by network bit count): 1.2.3.4/24 +- IPv6 Subnet (by network bit count): fe80::1/48 +- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 +- IPv4 Range: 1.2.3.4-1.2.3.7 +- IPv6 Range: fe80::1-fe80::9 +- Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice, CaptivePortal. + +> [!TIP] +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword "LocalSubnet4" means that all local IPv4 addresses are matching this rule). > [!NOTE] -> Querying for rules with this parameter can only be performed using filter objects. See the **Get-NetFirewallAddressFilter** cmdlet for more information. +> Querying for rules with this parameter can only be performed using filter objects. +> See the [Get-NetFirewallAddressFilter](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] diff --git a/docset/winserver2022-ps/netsecurity/Set-NetFirewallRule.md b/docset/winserver2022-ps/netsecurity/Set-NetFirewallRule.md index 5d173cf638..d3ae4ade85 100644 --- a/docset/winserver2022-ps/netsecurity/Set-NetFirewallRule.md +++ b/docset/winserver2022-ps/netsecurity/Set-NetFirewallRule.md @@ -880,19 +880,25 @@ Accept wildcard characters: False ``` ### -RemoteAddress -Specifies that network packets with matching IP addresses match this rule. -This parameter value is the second end point of an IPsec rule and specifies the computers that are subject to the requirements of this rule. -This parameter value is an IPv4 or IPv6 address, subnet, range, or the following keyword: Any. -The acceptable formats for this parameter are: -- Single IPv4 Address: 1.2.3.4 -- Single IPv6 Address: fe80::1 -- IPv4 Subnet (by network bit count): 1.2.3.4/24 -- IPv6 Subnet (by network bit count): fe80::1/48 -- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 -- IPv4 Range: 1.2.3.4 through 1.2.3.7 -- IPv6 Range: fe80::1 through fe80::9 -Querying for rules with this parameter can only be performed using filter objects. -See the Get-NetFirewallAddressFilter cmdlet for more information. +Specifies that network packets with matching IP addresses match this rule. +This parameter value is an IPv4 or IPv6 address, subnet, range or keyword. +The acceptable formats for this parameter are: + +- Single IPv4 Address: 1.2.3.4 +- Single IPv6 Address: fe80::1 +- IPv4 Subnet (by network bit count): 1.2.3.4/24 +- IPv6 Subnet (by network bit count): fe80::1/48 +- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 +- IPv4 Range: 1.2.3.4-1.2.3.7 +- IPv6 Range: fe80::1-fe80::9 +- Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice, CaptivePortal. + +> [!TIP] +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword "LocalSubnet4" means that all local IPv4 addresses are matching this rule). + +> [!NOTE] +> Querying for rules with this parameter can only be performed using filter objects. +> See the [Get-NetFirewallAddressFilter](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] @@ -1097,4 +1103,3 @@ The path after the pound sign (`#`) provides the namespace and class name for th [Set-NetFirewallSetting](./Set-NetFirewallSetting.md) [Show-NetFirewallRule](./Show-NetFirewallRule.md) - diff --git a/docset/winserver2025-ps/netsecurity/New-NetFirewallRule.md b/docset/winserver2025-ps/netsecurity/New-NetFirewallRule.md index 61a8adb035..0ca4379b65 100644 --- a/docset/winserver2025-ps/netsecurity/New-NetFirewallRule.md +++ b/docset/winserver2025-ps/netsecurity/New-NetFirewallRule.md @@ -804,15 +804,19 @@ The acceptable formats for this parameter are: - Single IPv4 Address: 1.2.3.4 - Single IPv6 Address: fe80::1 -- IPv4 Subnet (by network bit count): 1.2.3.4/24 -- IPv6 Subnet (by network bit count): fe80::1/48 -- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 +- IPv4 Subnet (by network bit count): 1.2.3.4/24 +- IPv6 Subnet (by network bit count): fe80::1/48 +- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 - IPv4 Range: 1.2.3.4-1.2.3.7 - IPv6 Range: fe80::1-fe80::9 -- Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice. NOTE: Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword "LocalSubnet4" means that all local IPv4 addresses are matching this rule). +- Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice, CaptivePortal. -Querying for rules with this parameter can only be performed using filter objects. -See the Get-NetFirewallAddressFilter cmdlet for more information. +> [!TIP] +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword "LocalSubnet4" means that all local IPv4 addresses are matching this rule). + +> [!NOTE] +> Querying for rules with this parameter can only be performed using filter objects. +> See the [Get-NetFirewallAddressFilter](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] diff --git a/docset/winserver2025-ps/netsecurity/Set-NetFirewallAddressFilter.md b/docset/winserver2025-ps/netsecurity/Set-NetFirewallAddressFilter.md index b6a9574fc1..19636dae3e 100644 --- a/docset/winserver2025-ps/netsecurity/Set-NetFirewallAddressFilter.md +++ b/docset/winserver2025-ps/netsecurity/Set-NetFirewallAddressFilter.md @@ -247,19 +247,24 @@ Accept wildcard characters: False ### -RemoteAddress Specifies that network packets with matching IP addresses match this rule. -This parameter value is the second end point of an IPsec rule and specifies the computers that are subject to the requirements of this rule. -This parameter value is an IPv4 or IPv6 address, hostname, subnet, range, or the following keyword: Any. +This parameter value is an IPv4 or IPv6 address, subnet, range or keyword. The acceptable formats for this parameter are: + - Single IPv4 Address: 1.2.3.4 - Single IPv6 Address: fe80::1 - IPv4 Subnet (by network bit count): 1.2.3.4/24 - IPv6 Subnet (by network bit count): fe80::1/48 - IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 -- IPv4 Range: 1.2.3.4 through 1.2.3.7 -- IPv6 Range: fe80::1 through fe80::9 +- IPv4 Range: 1.2.3.4-1.2.3.7 +- IPv6 Range: fe80::1-fe80::9 +- Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice, CaptivePortal. + +> [!TIP] +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword "LocalSubnet4" means that all local IPv4 addresses are matching this rule). > [!NOTE] -> Querying for rules with this parameter can only be performed using filter objects. See the **Get-NetFirewallAddressFilter** cmdlet for more information. +> Querying for rules with this parameter can only be performed using filter objects. +> See the [Get-NetFirewallAddressFilter](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] diff --git a/docset/winserver2025-ps/netsecurity/Set-NetFirewallRule.md b/docset/winserver2025-ps/netsecurity/Set-NetFirewallRule.md index 4ec8d7bcfe..cca5d4584f 100644 --- a/docset/winserver2025-ps/netsecurity/Set-NetFirewallRule.md +++ b/docset/winserver2025-ps/netsecurity/Set-NetFirewallRule.md @@ -881,18 +881,24 @@ Accept wildcard characters: False ### -RemoteAddress Specifies that network packets with matching IP addresses match this rule. -This parameter value is the second end point of an IPsec rule and specifies the computers that are subject to the requirements of this rule. -This parameter value is an IPv4 or IPv6 address, subnet, range, or the following keyword: Any. +This parameter value is an IPv4 or IPv6 address, subnet, range or keyword. The acceptable formats for this parameter are: + - Single IPv4 Address: 1.2.3.4 - Single IPv6 Address: fe80::1 - IPv4 Subnet (by network bit count): 1.2.3.4/24 - IPv6 Subnet (by network bit count): fe80::1/48 - IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0 -- IPv4 Range: 1.2.3.4 through 1.2.3.7 -- IPv6 Range: fe80::1 through fe80::9 -Querying for rules with this parameter can only be performed using filter objects. -See the Get-NetFirewallAddressFilter cmdlet for more information. +- IPv4 Range: 1.2.3.4-1.2.3.7 +- IPv6 Range: fe80::1-fe80::9 +- Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice, CaptivePortal. + +> [!TIP] +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword "LocalSubnet4" means that all local IPv4 addresses are matching this rule). + +> [!NOTE] +> Querying for rules with this parameter can only be performed using filter objects. +> See the [Get-NetFirewallAddressFilter](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] @@ -1097,4 +1103,3 @@ The path after the pound sign (`#`) provides the namespace and class name for th [Set-NetFirewallSetting](./Set-NetFirewallSetting.md) [Show-NetFirewallRule](./Show-NetFirewallRule.md) - From 8be4aa88ae514c6c3939f4bf6fcff8fbc0af043b Mon Sep 17 00:00:00 2001 From: Kirill Nikolaev Date: Wed, 14 Feb 2024 10:07:56 +0200 Subject: [PATCH 2/2] Improves the style per the style guide --- docset/winserver2016-ps/netsecurity/New-NetFirewallRule.md | 4 ++-- .../netsecurity/Set-NetFirewallAddressFilter.md | 4 ++-- docset/winserver2016-ps/netsecurity/Set-NetFirewallRule.md | 4 ++-- docset/winserver2019-ps/netsecurity/New-NetFirewallRule.md | 4 ++-- .../netsecurity/Set-NetFirewallAddressFilter.md | 4 ++-- docset/winserver2019-ps/netsecurity/Set-NetFirewallRule.md | 4 ++-- docset/winserver2022-ps/netsecurity/New-NetFirewallRule.md | 4 ++-- .../netsecurity/Set-NetFirewallAddressFilter.md | 4 ++-- docset/winserver2022-ps/netsecurity/Set-NetFirewallRule.md | 4 ++-- docset/winserver2025-ps/netsecurity/New-NetFirewallRule.md | 4 ++-- .../netsecurity/Set-NetFirewallAddressFilter.md | 4 ++-- docset/winserver2025-ps/netsecurity/Set-NetFirewallRule.md | 4 ++-- 12 files changed, 24 insertions(+), 24 deletions(-) diff --git a/docset/winserver2016-ps/netsecurity/New-NetFirewallRule.md b/docset/winserver2016-ps/netsecurity/New-NetFirewallRule.md index 3025850dfb..111fe9dc9a 100644 --- a/docset/winserver2016-ps/netsecurity/New-NetFirewallRule.md +++ b/docset/winserver2016-ps/netsecurity/New-NetFirewallRule.md @@ -812,11 +812,11 @@ The acceptable formats for this parameter are: - Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice. > [!TIP] -> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword "LocalSubnet4" means that all local IPv4 addresses are matching this rule). +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword `LocalSubnet4` means that all local IPv4 addresses are matching this rule). > [!NOTE] > Querying for rules with this parameter can only be performed using filter objects. -> See the [Get-NetFirewallAddressFilter](./Get-NetFirewallAddressFilter.md) cmdlet for more information. +> See the [`Get-NetFirewallAddressFilter`](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] diff --git a/docset/winserver2016-ps/netsecurity/Set-NetFirewallAddressFilter.md b/docset/winserver2016-ps/netsecurity/Set-NetFirewallAddressFilter.md index a2f5453b23..744daf91ae 100644 --- a/docset/winserver2016-ps/netsecurity/Set-NetFirewallAddressFilter.md +++ b/docset/winserver2016-ps/netsecurity/Set-NetFirewallAddressFilter.md @@ -260,11 +260,11 @@ The acceptable formats for this parameter are: - Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice. > [!TIP] -> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword "LocalSubnet4" means that all local IPv4 addresses are matching this rule). +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword `LocalSubnet4` means that all local IPv4 addresses are matching this rule). > [!NOTE] > Querying for rules with this parameter can only be performed using filter objects. -> See the [Get-NetFirewallAddressFilter](./Get-NetFirewallAddressFilter.md) cmdlet for more information. +> See the [`Get-NetFirewallAddressFilter`](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] diff --git a/docset/winserver2016-ps/netsecurity/Set-NetFirewallRule.md b/docset/winserver2016-ps/netsecurity/Set-NetFirewallRule.md index cfdc68d7db..f392cd6255 100644 --- a/docset/winserver2016-ps/netsecurity/Set-NetFirewallRule.md +++ b/docset/winserver2016-ps/netsecurity/Set-NetFirewallRule.md @@ -912,11 +912,11 @@ The acceptable formats for this parameter are: - Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice. > [!TIP] -> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword "LocalSubnet4" means that all local IPv4 addresses are matching this rule). +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword `LocalSubnet4` means that all local IPv4 addresses are matching this rule). > [!NOTE] > Querying for rules with this parameter can only be performed using filter objects. -> See the [Get-NetFirewallAddressFilter](./Get-NetFirewallAddressFilter.md) cmdlet for more information. +> See the [`Get-NetFirewallAddressFilter`](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] diff --git a/docset/winserver2019-ps/netsecurity/New-NetFirewallRule.md b/docset/winserver2019-ps/netsecurity/New-NetFirewallRule.md index 6b719458ce..38614cc468 100644 --- a/docset/winserver2019-ps/netsecurity/New-NetFirewallRule.md +++ b/docset/winserver2019-ps/netsecurity/New-NetFirewallRule.md @@ -812,11 +812,11 @@ The acceptable formats for this parameter are: - Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice, CaptivePortal (Windows 10 only). > [!TIP] -> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword "LocalSubnet4" means that all local IPv4 addresses are matching this rule). +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword `LocalSubnet4` means that all local IPv4 addresses are matching this rule). > [!NOTE] > Querying for rules with this parameter can only be performed using filter objects. -> See the [Get-NetFirewallAddressFilter](./Get-NetFirewallAddressFilter.md) cmdlet for more information. +> See the [`Get-NetFirewallAddressFilter`](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] diff --git a/docset/winserver2019-ps/netsecurity/Set-NetFirewallAddressFilter.md b/docset/winserver2019-ps/netsecurity/Set-NetFirewallAddressFilter.md index 40e2d3e620..bf80866f2d 100644 --- a/docset/winserver2019-ps/netsecurity/Set-NetFirewallAddressFilter.md +++ b/docset/winserver2019-ps/netsecurity/Set-NetFirewallAddressFilter.md @@ -260,11 +260,11 @@ The acceptable formats for this parameter are: - Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice, CaptivePortal (Windows 10 only). > [!TIP] -> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword "LocalSubnet4" means that all local IPv4 addresses are matching this rule). +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword `LocalSubnet4` means that all local IPv4 addresses are matching this rule). > [!NOTE] > Querying for rules with this parameter can only be performed using filter objects. -> See the [Get-NetFirewallAddressFilter](./Get-NetFirewallAddressFilter.md) cmdlet for more information. +> See the [`Get-NetFirewallAddressFilter`](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] diff --git a/docset/winserver2019-ps/netsecurity/Set-NetFirewallRule.md b/docset/winserver2019-ps/netsecurity/Set-NetFirewallRule.md index fb3e0d2656..ff6ede626a 100644 --- a/docset/winserver2019-ps/netsecurity/Set-NetFirewallRule.md +++ b/docset/winserver2019-ps/netsecurity/Set-NetFirewallRule.md @@ -912,11 +912,11 @@ The acceptable formats for this parameter are: - Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice, CaptivePortal (Windows 10 only). > [!TIP] -> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword "LocalSubnet4" means that all local IPv4 addresses are matching this rule). +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword `LocalSubnet4` means that all local IPv4 addresses are matching this rule). > [!NOTE] > Querying for rules with this parameter can only be performed using filter objects. -> See the [Get-NetFirewallAddressFilter](./Get-NetFirewallAddressFilter.md) cmdlet for more information. +> See the [`Get-NetFirewallAddressFilter`](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] diff --git a/docset/winserver2022-ps/netsecurity/New-NetFirewallRule.md b/docset/winserver2022-ps/netsecurity/New-NetFirewallRule.md index 701f76de83..aa9aaa7cbb 100644 --- a/docset/winserver2022-ps/netsecurity/New-NetFirewallRule.md +++ b/docset/winserver2022-ps/netsecurity/New-NetFirewallRule.md @@ -812,11 +812,11 @@ The acceptable formats for this parameter are: - Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice, CaptivePortal. > [!TIP] -> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword "LocalSubnet4" means that all local IPv4 addresses are matching this rule). +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword `LocalSubnet4` means that all local IPv4 addresses are matching this rule). > [!NOTE] > Querying for rules with this parameter can only be performed using filter objects. -> See the [Get-NetFirewallAddressFilter](./Get-NetFirewallAddressFilter.md) cmdlet for more information. +> See the [`Get-NetFirewallAddressFilter`](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] diff --git a/docset/winserver2022-ps/netsecurity/Set-NetFirewallAddressFilter.md b/docset/winserver2022-ps/netsecurity/Set-NetFirewallAddressFilter.md index b117e06ce6..64417b6104 100644 --- a/docset/winserver2022-ps/netsecurity/Set-NetFirewallAddressFilter.md +++ b/docset/winserver2022-ps/netsecurity/Set-NetFirewallAddressFilter.md @@ -260,11 +260,11 @@ The acceptable formats for this parameter are: - Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice, CaptivePortal. > [!TIP] -> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword "LocalSubnet4" means that all local IPv4 addresses are matching this rule). +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword `LocalSubnet4` means that all local IPv4 addresses are matching this rule). > [!NOTE] > Querying for rules with this parameter can only be performed using filter objects. -> See the [Get-NetFirewallAddressFilter](./Get-NetFirewallAddressFilter.md) cmdlet for more information. +> See the [`Get-NetFirewallAddressFilter`](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] diff --git a/docset/winserver2022-ps/netsecurity/Set-NetFirewallRule.md b/docset/winserver2022-ps/netsecurity/Set-NetFirewallRule.md index d3ae4ade85..4136b6e016 100644 --- a/docset/winserver2022-ps/netsecurity/Set-NetFirewallRule.md +++ b/docset/winserver2022-ps/netsecurity/Set-NetFirewallRule.md @@ -894,11 +894,11 @@ The acceptable formats for this parameter are: - Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice, CaptivePortal. > [!TIP] -> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword "LocalSubnet4" means that all local IPv4 addresses are matching this rule). +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword `LocalSubnet4` means that all local IPv4 addresses are matching this rule). > [!NOTE] > Querying for rules with this parameter can only be performed using filter objects. -> See the [Get-NetFirewallAddressFilter](./Get-NetFirewallAddressFilter.md) cmdlet for more information. +> See the [`Get-NetFirewallAddressFilter`](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] diff --git a/docset/winserver2025-ps/netsecurity/New-NetFirewallRule.md b/docset/winserver2025-ps/netsecurity/New-NetFirewallRule.md index 0ca4379b65..f9d443bb22 100644 --- a/docset/winserver2025-ps/netsecurity/New-NetFirewallRule.md +++ b/docset/winserver2025-ps/netsecurity/New-NetFirewallRule.md @@ -812,11 +812,11 @@ The acceptable formats for this parameter are: - Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice, CaptivePortal. > [!TIP] -> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword "LocalSubnet4" means that all local IPv4 addresses are matching this rule). +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword `LocalSubnet4` means that all local IPv4 addresses are matching this rule). > [!NOTE] > Querying for rules with this parameter can only be performed using filter objects. -> See the [Get-NetFirewallAddressFilter](./Get-NetFirewallAddressFilter.md) cmdlet for more information. +> See the [`Get-NetFirewallAddressFilter`](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] diff --git a/docset/winserver2025-ps/netsecurity/Set-NetFirewallAddressFilter.md b/docset/winserver2025-ps/netsecurity/Set-NetFirewallAddressFilter.md index 19636dae3e..e25acf4f3d 100644 --- a/docset/winserver2025-ps/netsecurity/Set-NetFirewallAddressFilter.md +++ b/docset/winserver2025-ps/netsecurity/Set-NetFirewallAddressFilter.md @@ -260,11 +260,11 @@ The acceptable formats for this parameter are: - Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice, CaptivePortal. > [!TIP] -> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword "LocalSubnet4" means that all local IPv4 addresses are matching this rule). +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword `LocalSubnet4` means that all local IPv4 addresses are matching this rule). > [!NOTE] > Querying for rules with this parameter can only be performed using filter objects. -> See the [Get-NetFirewallAddressFilter](./Get-NetFirewallAddressFilter.md) cmdlet for more information. +> See the [`Get-NetFirewallAddressFilter`](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[] diff --git a/docset/winserver2025-ps/netsecurity/Set-NetFirewallRule.md b/docset/winserver2025-ps/netsecurity/Set-NetFirewallRule.md index cca5d4584f..ee5bec181c 100644 --- a/docset/winserver2025-ps/netsecurity/Set-NetFirewallRule.md +++ b/docset/winserver2025-ps/netsecurity/Set-NetFirewallRule.md @@ -894,11 +894,11 @@ The acceptable formats for this parameter are: - Keyword: Any, LocalSubnet, DNS, DHCP, WINS, DefaultGateway, Internet, Intranet, IntranetRemoteAccess, PlayToDevice, CaptivePortal. > [!TIP] -> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword "LocalSubnet4" means that all local IPv4 addresses are matching this rule). +> Keywords can be restricted to IPv4 or IPv6 by appending a 4 or 6 (for example, keyword `LocalSubnet4` means that all local IPv4 addresses are matching this rule). > [!NOTE] > Querying for rules with this parameter can only be performed using filter objects. -> See the [Get-NetFirewallAddressFilter](./Get-NetFirewallAddressFilter.md) cmdlet for more information. +> See the [`Get-NetFirewallAddressFilter`](./Get-NetFirewallAddressFilter.md) cmdlet for more information. ```yaml Type: String[]